What Is the Acunetix Target Knowledge Base

What Is the Acunetix Target Knowledge Base

With the latest update to Acunetix, we introduced a new feature called the target knowledge base. Every time you scan a target, Acunetix gathers and stores information about it. This information includes paths that make up the site structure, the location of forms and their... Read more The post What ... Read More
Step-By-Step Asset Discovery with Acunetix

Step-By-Step Asset Discovery with Acunetix

One of the biggest pains of larger businesses is that they usually do not have a single library that lists all their assets. There are many reasons for this, for example, many businesses are actually a merger of several organizations and their structure tends to... Read more The post Step-By-Step ... Read More
Managing Scans using Python and the Acunetix API

Managing Scans using Python and the Acunetix API

In the two previous installments of this series, we have shown you how to manage Acunetix scans using Bash and PowerShell together with the Acunetix API. In this article, you will learn how to do the same using Python. As an example, we will create... Read more The post Managing ... Read More
Scanning Authenticated Web Assets with the Login Sequence Recorder

Scanning Authenticated Web Assets with the Login Sequence Recorder

Most web applications and websites require some form of authentication – either as a whole or in an area. Many web vulnerability scanners struggle with such authenticated web assets. While some scanners are able to detect standard authentication forms and mechanisms, in the case of... Read more The post Scanning ... Read More
Managing Scans using PowerShell and the Acunetix API

Managing Scans using PowerShell and the Acunetix API

In the previous installment of this series, we have shown you how to manage Acunetix scans using Bash and the Acunetix API. In this article, you will learn how to do the same using PowerShell. As an example, we will create a PowerShell V7 script... Read more The post Managing ... Read More
Scanning a Google OAuth 2.0 Web Application

Scanning a Google OAuth 2.0 Web Application

One of the most important qualities of a professional web application vulnerability scanner is the ability to reach every part of the web application, including the protected areas. While many scanners struggle with this, Acunetix supports several authentication mechanisms and offers an easy way to... Read more The post Scanning ... Read More
Managing Scans using Bash and the Acunetix API

Managing Scans using Bash and the Acunetix API

The Acunetix API allows you to programmatically manage your Acunetix tasks, including triggering scans for targets, checking the status of your scans, and retrieving a list of vulnerabilities found by your scans. This example can serve as a primer for building such programmatic tools. In... Read more The post Managing ... Read More
Scanning a GraphQL API for Vulnerabilities

Scanning a GraphQL API for Vulnerabilities

Since June 2020, Acunetix supports the increasingly popular API query language – GraphQL. In this article, we want to show you step-by-step how to scan an API defined using GraphQL. To do this, you will first create an intentionally vulnerable API and its GraphQL definition,... Read more The post Scanning ... Read More
Step-By-Step Configuration with Azure DevOps Services

Step-By-Step Configuration with Azure DevOps Services

You can integrate your Acunetix Premium account with Azure DevOps Services. This integration lets you send all the vulnerabilities discovered using Acunetix to Azure DevOps, where you can manage them as issues. This article shows how to set up your Azure DevOps account and how... Read more The post Step-By-Step ... Read More
Step-by-Step Configuration with GitLab

Step-by-Step Configuration with GitLab

| | Product Articles
You can manage web vulnerabilities internally with Acunetix. However, these vulnerabilities will need to be fixed by developers and the developers may already use an issue management system. Therefore, managing them internally might not be an optimal choice. In such a case, your vulnerability scanner... Read more The post Step-by-Step ... Read More